what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 67 RSS Feed

Files Date: 2009-03-09 to 2009-03-10

PHPRecipeBook 2.24 SQL Injection
Posted Mar 9, 2009
Authored by d3b4g

PHPRecipeBook version 2.24 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 610a811c527263217bdf3030b7f78ca1dff61c93540f8c74ba0bee1df21cbbad
Siemens TCP/53 Denial Of Service
Posted Mar 9, 2009
Authored by Benkei

Apparently a simple TCP connection to port 53 of a Siemens Gigaset SE461 WiMAX router causes a denial of service condition.

tags | exploit, denial of service, tcp
SHA-256 | 85af3098b153a8de4dff6464bbdc089d9829be7754c7439a69ad8b59c84af6a6
MD5 Cracker Script
Posted Mar 9, 2009
Authored by Stefan M.

Simple script to crack MD5 signatures. Needs a dictionary file, of course.

tags | tool, scanner
systems | unix
SHA-256 | 694c975d932707afab3b31c98cb2d114441cee8ca9f3a16271d82f31b00977dc
SQL Injection Table Script
Posted Mar 9, 2009
Authored by D4T4X

Simple perl script for bruteforcing tables on a SQL injection vulnerability.

tags | tool, scanner, perl, sql injection
systems | unix
SHA-256 | 61f9cf129529caa23632ac1c923547a9caddf55ff6b956bd629704d1744426c2
Simple Local File Inclusion Checker
Posted Mar 9, 2009
Authored by D4T4X

Simple perl script for checking a variable for local file inclusion.

tags | tool, local, scanner, perl, file inclusion
systems | unix
SHA-256 | 7a89062aa2bc8ae5f5a76310fae76750c8558091805e968453b79a0c4e154f85
Simple Remote File Inclusion Checker
Posted Mar 9, 2009
Authored by D4T4X

Simple perl script for checking a variable for remote file inclusion.

tags | tool, remote, scanner, perl, file inclusion
systems | unix
SHA-256 | d955aa7ad17d48675b1f1e7e68d98580628e35110797410881c17f73ad6f7a7c
Secunia - Foxit Reader JBIG2 Dictionary Processing
Posted Mar 9, 2009
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Foxit Reader, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an error when processing JBIG2 symbol dictionary segments. This can be exploited to dereference uninitialized memory via a specially crafted PDF file. Successful exploitation may allow execution of arbitrary code.

tags | advisory, arbitrary
advisories | CVE-2009-0191
SHA-256 | 6ef4c16836c7610b92f1a0cb927a41ff77eee2ce316d8f26ef48ae1ddf06098c
CS-Cart 2.0.0 Beta 3 SQL Injection
Posted Mar 9, 2009
Authored by julioisaias

CS-Cart version 2.0.0 Beta 3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4cb41ade481056f26106b2b123c9b4430ba4367f7b2165bb03ee03e13f42331c
AdSuck DNS Server 1.4
Posted Mar 9, 2009
Authored by Marco Peereboom | Site peereboom.us

adsuck is a small DNS server that spoofs blacklisted addresses and forwards all other queries. The idea is to be able to prevent connections to undesirable sites such as ad servers, crawlers, etc. It can be used locally, for the road warrior, or on the network perimeter in order to protect local machines from malicious sites.

tags | tool, local, spoof
systems | unix
SHA-256 | 9eab21f007c36ee4fc591c85a282fde043487740273d77c93beaab4492a45686
mks_vir 9 BETA Privilege Escalation
Posted Mar 9, 2009
Authored by Alex from NT Internals | Site ntinternals.org

mks_vir 9 BETA versions below 1.2.0.0 build 297 local privilege escalation exploit.

tags | exploit, local
SHA-256 | 7016311d5427e6cede2f1c1fe336eb5e13386dfa2d08a829097ee9e12a1e7bc7
Nokia Multimedia Player 1.0 SEH Overwrite
Posted Mar 9, 2009
Authored by 0in, His0k4

Nokia Multimedia Player version 1.0 playlist universal SEH overwrite exploit that spawns calc.exe.

tags | exploit
SHA-256 | d7f6e75a11628fccd1cccdb0f94b9fb076ef27c76d5429810a3f86623eb6d43c
Gentoo Linux Security Advisory 200903-14
Posted Mar 9, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200903-14 - Incomplete verification of RSA and DSA certificates might lead to spoofed records authenticated using DNSSEC. BIND does not properly check the return value from the OpenSSL functions to verify DSA (CVE-2009-0025) and RSA (CVE-2009-0265) certificates. Versions less than 9.4.3_p1 are affected.

tags | advisory, spoof
systems | linux, gentoo
advisories | CVE-2009-0025, CVE-2009-0265
SHA-256 | 65d79671fc4d8b5e91d51aac2cfeae01b0fa6697d3ac98832479ee8f3cd10005
Gentoo Linux Security Advisory 200903-13
Posted Mar 9, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200903-13 - Multiple buffer overflows in MPFR might lead to a Denial of Service. Multiple buffer overflows have been reported in the mpfr_snprintf() and mpfr_vsnprintf() functions. Versions less than 2.4.1 are affected.

tags | advisory, denial of service, overflow
systems | linux, gentoo
advisories | CVE-2009-0757
SHA-256 | 00630dfb4d8532a9d36cd433bd5c10f019460632da2383b49fa591e1173a8be1
Gentoo Linux Security Advisory 200903-12
Posted Mar 9, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200903-12 - A vulnerability in OptiPNG might result in user-assisted execution of arbitrary code. Roy Tam reported a use-after-free vulnerability in the GIFReadNextExtension() function in lib/pngxtern/gif/gifread.c leading to a memory corruption when reading a GIF image. Versions less than 0.6.2-r1 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
advisories | CVE-2009-0749
SHA-256 | 4276d2ceb988241a348b65387b53b2c25e279880943ccc7bb9dffaa60c84311e
Gentoo Linux Security Advisory 200903-11
Posted Mar 9, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200903-11 - A buffer overflow in PyCrypto might lead to the execution of arbitrary code when decrypting using ARC2. Mike Wiacek of the Google Security Team reported a buffer overflow in the ARC2 module when processing a large ARC2 key length. Versions less than 2.0.1-r8 are affected.

tags | advisory, overflow, arbitrary
systems | linux, gentoo
advisories | CVE-2009-0544
SHA-256 | b48dbee97d58e7d9d714c39584306a242eaadaab6a4dbf64fc7783df14fab56b
Realtek Sound Manager 1.15.0.0 SEH Overwrite
Posted Mar 9, 2009
Authored by shinnai | Site shinnai.altervista.org

Realtek Sound Manager versions 1.15.0.0 playlist SEH overwrite exploit.

tags | exploit
SHA-256 | f71b6f8aa931b4bd368ffd26d25973fc1447da425b329a90ded08cf4722b3902
GNU SIP Witch Telephony Server
Posted Mar 9, 2009
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: SIP publish messages now updates internal presence status. CFWD busy can be used if no dnd or away forward target set. Various other enhancements.
tags | telephony, protocol
SHA-256 | 09681117081f8045e64ab36cd5b79f1cb8a032b665588a392da6008aded1c0bc
EO Video 1.36 SEH Overwrite Exploit
Posted Mar 9, 2009
Authored by j0rgan, His0k4 | Site jorgan.users.cg.yu

EO Video version 1.36 playlist SEH overwrite exploit.

tags | exploit
SHA-256 | 2356a9f5ba08842575987b6b361a6aa9f1d8850ef09dc39e2a5403df3eac97e5
Guk CMS SQL Injection
Posted Mar 9, 2009
Authored by Securitylab Security Research | Site securitylab.ir

Guk CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1968503c11a1bd370b798853a5f7559ba1a6fc90f39725f5f6371fc59d552c83
phpCommunity 2.1.8 SQL Injection / Traversal / XSS
Posted Mar 9, 2009
Authored by Salvatore Fresta

phpCommunity 2 version 2.1.8 suffers from remote SQL injection, directory traversal, and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, file inclusion
SHA-256 | 440a26183e69646d7610d0a76130e39880614d2be25c4f94aa5d423ea4131fac
CMS S.Builder 3.7 Remote File Inclusion
Posted Mar 9, 2009
Authored by cr0w | Site cr0w-at.blogspot.com

CMS S.Builder versions 3.7 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 3627aea474600f160c884b2c224920abf37f13169c435bae5b193e28ddc8de56
Belkin BullDog Buffer Overflow
Posted Mar 9, 2009
Authored by Elazar Broad

Belkin BullDog Plus UPS-Service buffer overflow exploit that binds a shell to port 4444.

tags | exploit, overflow, shell
SHA-256 | b618160c09e59803fe7c32c8d7abf7d6978e1c98bf9aa4e15cfffb8fc6be6a40
Secunia Security Advisory 34161
Posted Mar 9, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for openttd. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, gentoo
SHA-256 | ef96f7eede507c7603e74992cacae924a5e5bd90d360a4a026bcc2968afd1ca7
Secunia Security Advisory 34188
Posted Mar 9, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for networkmanager. This fixes two security issues, which can be exploited by malicious, local users to manipulate certain data and disclose potentially sensitive information.

tags | advisory, local
systems | linux, fedora
SHA-256 | 05d2934f725e2a05825dd724172a26353c51df6c516904000c9b01bcfbfd8b65
Secunia Security Advisory 34182
Posted Mar 9, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for openswan. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, gentoo
SHA-256 | 1504bcb694ed0d86bb67ceca8a0e11458d6c2f0f35badb041373852291f582a0
Page 2 of 3
Back123Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close